CN112037375A - Control method and device of intelligent lock - Google Patents

Control method and device of intelligent lock Download PDF

Info

Publication number
CN112037375A
CN112037375A CN202010856097.1A CN202010856097A CN112037375A CN 112037375 A CN112037375 A CN 112037375A CN 202010856097 A CN202010856097 A CN 202010856097A CN 112037375 A CN112037375 A CN 112037375A
Authority
CN
China
Prior art keywords
information
unlocking
target
person
identity card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010856097.1A
Other languages
Chinese (zh)
Other versions
CN112037375B (en
Inventor
王桂荣
张典军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing AVIC HengAn Shijia Technology Co.,Ltd.
Original Assignee
Shenzhen Baofulai Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Baofulai Intelligent Technology Co ltd filed Critical Shenzhen Baofulai Intelligent Technology Co ltd
Priority to CN202010856097.1A priority Critical patent/CN112037375B/en
Publication of CN112037375A publication Critical patent/CN112037375A/en
Application granted granted Critical
Publication of CN112037375B publication Critical patent/CN112037375B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention discloses a control method and a device of an intelligent lock, wherein the control method comprises the following steps: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and the first calculation rule, and judging whether the second unlocking information is obtained or not; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information is acquired; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained; if yes, the intelligent lock is unlocked. The invention can greatly improve the safety operation of the intelligent lock and can record the information of the unlocking person.

Description

Control method and device of intelligent lock
Technical Field
The invention relates to the technical field of intelligent locks, in particular to a control method and a control device of an intelligent lock.
Background
The intelligent lock is a lock which is different from a traditional mechanical lock and is more intelligent in the aspects of user identification, safety and manageability, and the intelligent lock is an execution component for locking a door in an access control system. The electronic lock can not be called as an intelligent lock, and the intelligent mark of the intelligent lock is whether the intelligent lock can be remotely controlled by a mobile phone and linked with an intelligent home. The existing intelligent lock is different from the traditional mode of 'firstly opening and then scanning', the scanning mode is very simple, the finger is placed above the scanning position to scan from top to bottom, the finger does not need to be pressed at the scanning position, the fingerprint residue is reduced in the scanning mode, and the possibility of copying the fingerprint is greatly reduced. At present, the intelligent lock is widely used, and the safety performance of the intelligent lock is much higher than that of a common lock. The intelligent lock generally needs to input the password that sets up in advance and can open, and the setting of present intelligent lock password is fairly simple, and the unblock method to the intelligent lock also only simply sends the instruction of unblanking through intelligent terminal's APP and can open, it is very simple and convenient to use intelligent terminal to send the instruction of unblanking, but there is the potential safety hazard of great importance, be taken to user's intelligent terminal and then open the intelligent lock easily by other people and steal the activity, or after the user lost own intelligent terminal, also can't open own intelligent lock, the above problem is urgent to be solved.
Disclosure of Invention
Therefore, it is necessary to provide a method and an apparatus for controlling an intelligent lock to improve the security of the intelligent lock and ensure the property security of the user.
The first technical scheme of the embodiment of the invention is as follows:
a method of controlling an intelligent lock, comprising: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The second technical scheme of the embodiment of the invention is as follows:
a control device for an intelligent lock, comprising: the information acquisition module is used for acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent or not; the first judgment module is used for calculating second unlocking information according to the first unlocking information and a first calculation rule when the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time period or not; the second judging module is used for calculating third unlocking information according to the second unlocking information and a second calculation rule when the second unlocking information input by the target unlocking person is obtained within the first preset time length, and judging whether the third unlocking information input by the target unlocking person is obtained within a second preset time length or not; the third judging module is used for sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing when the third unlocking information input by the target unlocking person is obtained within the second preset time length, and judging whether the authorization information that a designated administrator agrees to unlock can be obtained within the third preset time length; and the authorized unlocking module is used for unlocking the intelligent lock and storing the identity card information, the fingerprint information and the iris information of the target unlocking person to a specified address when the authorized information that the specified administrator agrees to unlock can be acquired within the third preset time.
The third technical scheme of the embodiment of the invention is as follows:
a computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The fourth technical scheme of the embodiment of the invention is as follows:
a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The embodiment of the invention has the following beneficial effects:
the invention ensures that the target unlocking person inputs the unlocking information in steps, the unlocking information of each time is different, the unlocking information of each time needs to be calculated by combining the appointed calculation rule and the unlocking information of the last time, in addition, an appointed administrator needs to examine and verify the personal information of the target unlocking person, and finally, whether the target unlocking person is authorized or not can be determined, thereby greatly ensuring the unlocking safety of the intelligent lock and recording the information of the unlocking person.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
FIG. 1 is a flow chart illustrating an implementation of an embodiment of a method for controlling an intelligent lock;
FIG. 2 is a block diagram illustrating an embodiment of a control apparatus for an intelligent lock;
FIG. 3 is a block diagram illustrating an embodiment of a computer device in one embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart illustrating an implementation of a control method of an intelligent lock according to an embodiment, and referring to fig. 1, the control method of the intelligent lock according to the embodiment includes the following steps:
step S101: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent or not. Firstly, the information of the unlocking person is checked, and the personal identity information of the unlocking person is recorded so as to be well documented.
Step S102: and if the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, calculating second unlocking information according to the first unlocking information and the first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length. The second unlocking information calculated according to the first unlocking information and the first calculation rule is related to the current time and is a variable.
Step S103: if the second unlocking information input by the target unlocking person is obtained within a first preset time, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is obtained within a second preset time. The third unlocking information calculated according to the second unlocking information and the second calculation rule is related to the sex and the current time of the target unlocking person and is also a variable.
Step S104: if the third unlocking information input by the target unlocking person is obtained within a second preset time, the identity card information, the fingerprint information and the iris information of the target unlocking person are sent to an auditing platform for auditing, and whether authorization information that a designated administrator agrees to unlock can be obtained within a third preset time is judged.
Step S105: if the authorization information that the appointed administrator agrees to unlock can be acquired within a third preset time, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the appointed address.
In this embodiment, optionally, the calculating second unlocking information according to the first unlocking information and the first calculation rule includes:
firstly, acquiring birth year, month and day information and current year, month and day information corresponding to the identity card information of the target unlocking person. If the date of birth of the target unlocking person is 5-18 months in 1985, the current year, month and day is 8-20 months in 2020.
And secondly, subtracting a first year number, a first month number and a first day number corresponding to the current year, month and day information from a second year number, a second month number and a second day number corresponding to the birth year, month and day information to obtain a year difference absolute value, a month difference absolute value and a day difference absolute value. The date of birth of the target unlocking person is 1985, 5, 18 days, and the current time of year, month and day is 2020, 8, 20 days, so that the annual difference absolute value is 2020-.
Thirdly, summing the annual difference absolute value, the lunar difference absolute value and the solar difference absolute value to obtain a target summation result, and using the target summation result as the second unlocking information. As a result of the above calculation, the target sum result is 15+3+ 2-20.
In this embodiment, optionally, calculating third unlocking information according to the second unlocking information and a second calculation rule includes:
firstly, acquiring gender information corresponding to the identity card information of the target unlocking person and time period information of the current time. The gender information corresponding to the identity card information comprises a male and a female, and the time period information of the current time comprises two time periods of 23: 00-11: 00 and 11: 00-23: 00.
Secondly, if the gender information corresponds to a male, adding a first number to the target summation result, and if the gender information corresponds to a female, adding a second number to the target summation result to obtain a gender summation result. Wherein the first number is optionally 1 but not limited to 1, and the sum of the target sum result and the gender of the first number is: 20+1 ═ 21; wherein the second number is 2 but not limited to 2, and the sum of the target sum result and the gender of the second number is: 20+ 2-22. In the step, the sex of the target unlocking person is preferably male, and the sex summation result is 22.
And thirdly, if the time period information corresponds to a first time period, adding a third number to the gender summation result, and if the time period information corresponds to a second time period, subtracting a fourth number from the gender summation result to obtain third unlocking information.
Wherein the first time period is 23: 00-11: 00 and corresponds to the third number, and the second time period is 11: 00-23: 00 and corresponds to the fourth number. In this step, the optional third number is 1 but not limited to 1, and the optional fourth number is 2 but not limited to 2. If the current unlocking time point is just 11:00, the current unlocking time point belongs to the second time period, and if the current unlocking time point is just 23:00, the current unlocking time point belongs to the first time period. On the premise that the target unlocking person is a male, if the time period information corresponds to the first time period, adding a third number to the gender summation result, namely 22+1 is 23; if the time period information corresponds to a second time period, a fourth number, 22-2-20, is subtracted from the gender summation result.
In this embodiment, optionally, the determining whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent includes:
if the identity card information, the fingerprint information and the iris information of the target unlocking person are inconsistent, recording the identity card information, the fingerprint information and the iris information of the target unlocking person, and sending the current time point, the identity card information, the fingerprint information and the iris information of the target unlocking person to a specified platform for alarming. The identity card information, the fingerprint information and the iris information of the target unlocking person are inconsistent, so that the identity of the target unlocking person is suspicious, and the target unlocking person is possibly a thief and needs to be reminded to record the target unlocking person in a case for later case finding.
In this embodiment, optionally, the determining whether the unlocking authorization information of the designated administrator can be acquired within a third preset time period includes:
if the authorization information that the designated administrator agrees to unlock cannot be acquired within the third preset time, recording the identity card information, the fingerprint information and the iris information of the target unlocking person, and reminding the designated administrator to perform unlocking authorization processing.
In this embodiment, optionally, the unlocking the smart lock, and storing the identification card information, the fingerprint information, and the iris information of the target unlocking person to a designated address, and then includes:
firstly, if the locking signal of the intelligent lock is not detected within a fourth preset time, prompting the target unlocking person to carry out locking operation, and judging whether the locking signal is received within a fifth preset time.
And secondly, if the locking signal is not received within a fifth preset time, locking the intelligent lock, and warning the behavior that the target unlocking person does not lock.
In this embodiment, optionally, after determining whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent, and before calculating the second unlocking information according to the first unlocking information and the first calculation rule, the method includes:
if the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, but the identity card corresponding to the identity card information of the target unlocking person is overdue, the second unlocking information is not calculated according to the first unlocking information and the first calculation rule, and the identity card information of the target unlocking person is recorded and the target unlocking person is warned.
As shown in fig. 2, in another embodiment, a control device 100 of an intelligent lock is provided, which can be obtained with reference to fig. 2, and the control device 100 of the intelligent lock specifically includes:
the information obtaining module 10 is configured to obtain first unlocking information, where the first unlocking information includes identification card information, fingerprint information, and iris information of a target unlocking person, and determine whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent. Firstly, the information of the unlocking person is checked, and the personal identity information of the unlocking person is recorded so as to be well documented.
The first judging module 20 is configured to calculate second unlocking information according to the first unlocking information and the first calculation rule when the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent, and judge whether to acquire the second unlocking information input by the target unlocking person within a first preset time period. The second unlocking information calculated according to the first unlocking information and the first calculation rule is related to the current time and is a variable.
The second determining module 30 is configured to, when the second unlocking information input by the target unlocking person is obtained within the first preset time period, calculate third unlocking information according to the second unlocking information and a second calculation rule, and determine whether the third unlocking information input by the target unlocking person is obtained within a second preset time period. The third unlocking information calculated according to the second unlocking information and the second calculation rule is related to the sex and the current time of the target unlocking person and is also a variable.
And the third judging module 40 is configured to, when the third unlocking information input by the target unlocking person is obtained within the second preset duration, send the identification card information, the fingerprint information, and the iris information of the target unlocking person to an auditing platform for auditing, and judge whether the authorization information that the specified administrator agrees to unlock can be obtained within a third preset duration.
And the authorized unlocking module 50 is configured to unlock the intelligent lock when the authorized information that the designated administrator agrees to unlock the intelligent lock can be acquired within the third preset time period, and store the identification card information, the fingerprint information and the iris information of the target unlocking person to a designated address.
FIG. 3 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be a terminal, and may also be a server. As shown in fig. 3, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the age identification method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform the age identification method. Those skilled in the art will appreciate that the architecture shown in fig. 3 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In another embodiment, a computer device is presented, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
In another embodiment, a computer-readable storage medium is proposed, in which a computer program is stored which, when executed by a processor, causes the processor to carry out the steps of:
acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The invention ensures that the target unlocking person inputs the unlocking information in steps, the unlocking information of each time is different, the unlocking information of each time needs to be calculated by combining the appointed calculation rule and the last unlocking information, the calculation rule is associated with the current time and the identity information of the target unlocking person, so that the unlocking password is not a fixed password, in addition, an appointed manager needs to examine and verify the personal information of the target unlocking person, and finally, whether the unlocking is authorized or not can be determined, thereby greatly ensuring the unlocking safety of the intelligent lock and recording the information of the unlocking person.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A control method of an intelligent lock is characterized by comprising the following steps:
acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent;
if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length;
if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length;
if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length;
if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
2. The method for controlling an intelligent lock according to claim 1, wherein the calculating second unlocking information according to the first unlocking information and a first calculation rule includes:
acquiring birth year, month and day information and current year, month and day information corresponding to the identity card information of the target unlocking person;
subtracting a first year number, a first month number and a first day number corresponding to the current year, month and day information from a second year number, a second month number and a second day number corresponding to the birth year, month and day information to obtain an absolute value of a year difference, an absolute value of a month difference and an absolute value of a day difference;
and summing the annual difference absolute value, the lunar difference absolute value and the daily difference absolute value to obtain a target summation result, and taking the target summation result as the second unlocking information.
3. The method for controlling an intelligent lock according to claim 2, wherein calculating third unlocking information according to the second unlocking information and a second calculation rule includes:
acquiring gender information corresponding to the identity card information of the target unlocking person and time period information of the current time;
if the gender information corresponds to a male, adding a first number to the target summation result, and if the gender information corresponds to a female, adding a second number to the target summation result to obtain a gender summation result;
and if the time period information corresponds to a first time period, adding a third number to the gender summation result, and if the time period information corresponds to a second time period, subtracting a fourth number from the gender summation result to obtain third unlocking information.
4. The method for controlling an intelligent lock according to claim 1, wherein the determining whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent comprises:
if the identity card information, the fingerprint information and the iris information of the target unlocking person are inconsistent, recording the identity card information, the fingerprint information and the iris information of the target unlocking person, and sending the current time point, the identity card information, the fingerprint information and the iris information of the target unlocking person to a specified platform for alarming.
5. The method for controlling the intelligent lock according to claim 1, wherein the determining whether the unlocking authorization information of the designated administrator can be obtained within a third preset time period includes:
if the authorization information that the designated administrator agrees to unlock cannot be acquired within the third preset time, recording the identity card information, the fingerprint information and the iris information of the target unlocking person, and reminding the designated administrator to perform unlocking authorization processing.
6. The method for controlling the intelligent lock according to claim 1, wherein the unlocking the intelligent lock and saving the identification card information, the fingerprint information and the iris information of the target unlocking person to a designated address, then comprises:
if the locking signal of the intelligent lock is not detected within the fourth preset time, prompting the target unlocking person to perform locking operation, and judging whether the locking signal is received within the fifth preset time;
if not, the intelligent lock is locked, and the behavior that the target unlocking person does not lock is warned.
7. The method for controlling an intelligent lock according to claim 1, wherein after determining whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent with each other and before calculating the second unlocking information according to the first unlocking information and the first calculation rule, the method comprises:
if the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, but the identity card corresponding to the identity card information of the target unlocking person is overdue, the second unlocking information is not calculated according to the first unlocking information and the first calculation rule, and the identity card information of the target unlocking person is recorded and the target unlocking person is warned.
8. A control device of an intelligent lock is characterized by comprising:
the information acquisition module is used for acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent or not;
the first judgment module is used for calculating second unlocking information according to the first unlocking information and a first calculation rule when the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time period or not;
the second judging module is used for calculating third unlocking information according to the second unlocking information and a second calculation rule when the second unlocking information input by the target unlocking person is obtained within the first preset time length, and judging whether the third unlocking information input by the target unlocking person is obtained within a second preset time length or not;
the third judging module is used for sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing when the third unlocking information input by the target unlocking person is obtained within the second preset time length, and judging whether the authorization information that a designated administrator agrees to unlock can be obtained within the third preset time length;
and the authorized unlocking module is used for unlocking the intelligent lock and storing the identity card information, the fingerprint information and the iris information of the target unlocking person to a specified address when the authorized information that the specified administrator agrees to unlock can be acquired within the third preset time.
9. A computer-readable storage medium, storing a computer program which, when executed by a processor, causes the processor to carry out the steps of the method of controlling a smart lock according to any one of claims 1 to 7.
10. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method of controlling a smart lock as claimed in any one of claims 1 to 7.
CN202010856097.1A 2020-08-24 2020-08-24 Control method and device of intelligent lock Active CN112037375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010856097.1A CN112037375B (en) 2020-08-24 2020-08-24 Control method and device of intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010856097.1A CN112037375B (en) 2020-08-24 2020-08-24 Control method and device of intelligent lock

Publications (2)

Publication Number Publication Date
CN112037375A true CN112037375A (en) 2020-12-04
CN112037375B CN112037375B (en) 2021-08-03

Family

ID=73580669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010856097.1A Active CN112037375B (en) 2020-08-24 2020-08-24 Control method and device of intelligent lock

Country Status (1)

Country Link
CN (1) CN112037375B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751545A (en) * 2015-02-16 2015-07-01 张泽 System, method and device for processing permissions of door lock
CN105096427A (en) * 2015-08-29 2015-11-25 邱钊 Examinee identity authentication system applied to big-data iris recognition
CN204965552U (en) * 2015-08-29 2016-01-13 邱钊 Be applied to big data iris discernment examinee identity authentication system
CN106504369A (en) * 2015-09-07 2017-03-15 封楠林 Electronic coding lock system and encryption method
CN206292898U (en) * 2016-12-29 2017-06-30 重庆冠安科技有限公司 A kind of multiple-authentication safety-protection system
CN108133537A (en) * 2018-02-12 2018-06-08 浙江芯科物联科技有限公司 A kind of intelligent door lock and unlocking method
CN108505841A (en) * 2018-05-24 2018-09-07 太原科技大学 A kind of electromechanical more lock intelligent Web security doors in parallel
CN109882025A (en) * 2019-04-16 2019-06-14 中国银行股份有限公司 A kind of Bank Insurance cabinet device and bank custody control system
CN110349303A (en) * 2019-06-12 2019-10-18 深圳市宝富来智能技术有限公司 Smart lock controls method, apparatus, smart lock and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751545A (en) * 2015-02-16 2015-07-01 张泽 System, method and device for processing permissions of door lock
CN105096427A (en) * 2015-08-29 2015-11-25 邱钊 Examinee identity authentication system applied to big-data iris recognition
CN204965552U (en) * 2015-08-29 2016-01-13 邱钊 Be applied to big data iris discernment examinee identity authentication system
CN106504369A (en) * 2015-09-07 2017-03-15 封楠林 Electronic coding lock system and encryption method
CN206292898U (en) * 2016-12-29 2017-06-30 重庆冠安科技有限公司 A kind of multiple-authentication safety-protection system
CN108133537A (en) * 2018-02-12 2018-06-08 浙江芯科物联科技有限公司 A kind of intelligent door lock and unlocking method
CN108505841A (en) * 2018-05-24 2018-09-07 太原科技大学 A kind of electromechanical more lock intelligent Web security doors in parallel
CN109882025A (en) * 2019-04-16 2019-06-14 中国银行股份有限公司 A kind of Bank Insurance cabinet device and bank custody control system
CN110349303A (en) * 2019-06-12 2019-10-18 深圳市宝富来智能技术有限公司 Smart lock controls method, apparatus, smart lock and storage medium

Also Published As

Publication number Publication date
CN112037375B (en) 2021-08-03

Similar Documents

Publication Publication Date Title
CN109165940B (en) Anti-theft method and device and electronic equipment
CN109815803B (en) Face examination risk control method and device, computer equipment and storage medium
CN110489415B (en) Data updating method and related equipment
US20180054733A1 (en) Online identity scoring
CN104408343B (en) By a kind of threshold value calculation method of the Verification System to living things feature recognition
CN109767572B (en) Method and device for storing mailings, computer equipment and storage medium
CN109410398A (en) A kind of unlocking method, device, door lock and storage medium
CN110011796B (en) Certificate updating method and device, computer equipment and storage medium
CN110610347A (en) Park visitor message notification method and device, computer equipment and storage medium
CN110532292A (en) Alert string and method, apparatus, equipment and storage medium
CN109547990B (en) Method and device for controlling terminal unlocking, computer equipment and storage medium
CN112037375B (en) Control method and device of intelligent lock
CN109413034B (en) Application program data display method and device, computer equipment and storage medium
CN111683176B (en) Application addiction prevention method and device, computer equipment and storage medium
CN112334896A (en) Unlocking method and device of terminal device and storage medium
CN111652720A (en) Cloud evidence obtaining method and device, computer equipment and storage medium
CN111291344A (en) Fingerprint identification unlocking method and device, computer equipment and storage medium
CN110298149A (en) Account permission locking means, device, computer equipment and storage medium
CN110969430B (en) Suspicious user identification method, suspicious user identification device, computer equipment and storage medium
CN113570378A (en) Wind control variable identification method and device, electronic equipment and storage medium
CN111310138A (en) Method and device for protecting equipment information security, storage medium and electronic equipment
CN115664865B (en) Verification data transmission method, system, computer equipment and storage medium
CN109767344B (en) Vehicle insurance service processing method, device, computer equipment and storage medium
CN112257887B (en) Health acquisition method, apparatus, computer device and storage medium
CN110618998B (en) Battery replacement result updating method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240320

Address after: 637700, Group 3, Maohe Village, Xindian Town, Yingshan County, Nanchong City, Sichuan Province

Patentee after: Yu Xiaobing

Country or region after: China

Address before: 518000 401, plant 2, tengjun Industrial Park, district 73, Buxin community, Xin'an street, Bao'an District, Shenzhen, Guangdong Province

Patentee before: Shenzhen Baofulai Intelligent Technology Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240611

Address after: Building 8, No. 199 Yungang Road, Changxindian, Fengtai District, Beijing, 100074

Patentee after: Beijing AVIC HengAn Shijia Technology Co.,Ltd.

Country or region after: China

Address before: 637700, Group 3, Maohe Village, Xindian Town, Yingshan County, Nanchong City, Sichuan Province

Patentee before: Yu Xiaobing

Country or region before: China